Application Security IntrastructuresWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Application Security Intrastructures returned the following results.
RSS What is RSS?
Related Categories

 •   Application Security
 •   Application Management and Maintenance
 •   Data Security
 •   Security Monitoring
 •   Vulnerability Assessment
 •   Content Delivery Networks/ Web Application Acceleration
 •   Network Security
 •   Application Lifecycle Management(ALM)
 •   Testing and Analysis
 •   Security Policies

Related Searches
 •   Application Consultancy
 •   Application Make
 •   Application Security Standards
 •   Devices Application Security
 •   Media Application
 •   Problem Application
 •   Supplier Application Security
Advertisement

ALL RESULTS
1 - 25 of 466 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Application Hardening: Evolving Techniques for Proactive Enterprise Application Security by SearchSecurity.com

October 21, 2013 - (Free Research)
This expert guide from SearchSecurity.com provides crucial tips for creating an effective threat and vulnerability management program and examines how you can strengthen and streamline your application security. 
(EBOOK) READ ABSTRACT |

Using Free Web Application Security Scanning Tools to Secure Web Apps by Imperva

April 07, 2014 - (Free Research)
Expert Michael Cobb sheds light on the true benefits of a zero-cost, open source Web application security scanning tool. 
(EGUIDE) READ ABSTRACT |

SANS Survey on Application Security Programs and Practices by Hewlett-Packard Company

February 28, 2014 - (Free Research)
This SANS report pinpoints where the vulnerability gaps lie in today's application security programs. Click through for key recommendations on how to address these issues. 
(WHITE PAPER) READ ABSTRACT |

Barclays Application Security Assurance Project by Veracode, Inc.

February 17, 2011 - (Free Research)
As threats within the corporate information security landscape intensify, this award is geared to recognizing excellence in IT security projects within the financial sector. 
(CASE STUDY) READ ABSTRACT |

Automating Your Code Review: Moving to a SaaS Model for Application Security by Veracode, Inc.

February 10, 2009 - (Free Research)
Today’s application has become the enterprise’s ‘‘new perimeter’’. With better network‐level security technology hardening the network perimeter, malicious attackers are now focusing their efforts to strike at the least defended points ‐ the application. Read on to learn about automating code review for greater application security. 
(WHITE PAPER) READ ABSTRACT |

Monitor and Protect Critical Web Applications with a Web Application Firewall by Imperva

February 19, 2014 - (Free Research)
While the growth of business applications has grown, corporate resources have become more exposed to security threats. This resource takes a look at the growing risk of application attacks via SQL injection. 
(WEBCAST) READ ABSTRACT |

Five critical steps to achieving an effective application security program by IBM

December 31, 2013 - (Free Research)
This resource provides an overview of the application threats that your organization faces and describes which risks you need to prioritize. Also inside, find five practical steps you can take to build security into your development processes. 
(WHITE PAPER) READ ABSTRACT |

Technical Guide on Application Security by SearchSecurity.com

December 31, 2012 - (Free Research)
This expert Tech Guide from SearchSecurity.com offers insight on today's application security threat environment, as well as key recommendations and challenges with implementing the latest defense tools. 
(EZINE) READ ABSTRACT |

Magic Quadrant for Application Security Testing by Hewlett-Packard Company

July 02, 2013 - (Free Research)
Access this in-depth analyst report from Gartner on the top vendors in application security testing (AST) to find out which category of testing your organization needs to protect against intensifying targeted attacks. 
(ANALYST REPORT) READ ABSTRACT |

Case Study: SEEK Protects Sites with Web Application Security Firewall by Imperva

March 19, 2013 - (Free Research)
This case study features one organization's experience with a Web application security solution that tackled technical, logic, denial-of-service, and fraud attacks to reduce risk and save its reputation. 
(WEBCAST) READ ABSTRACT |

Beating Web Application Security Threats by Thawte Inc.

March 18, 2010 - (Free Research)
The rapid increase in usage, development and complexity of Web applications has created new opportunities for companies that employ them and hackers who attack them. This handbook delivers up-to-date information on security threats to Web 2.0 and rich Internet applications and expert advice on how to avoid those threats. 
(EBOOK) READ ABSTRACT |

BIG-IP Application Security Manager™ by F5 Networks

The BIG-IP Application Security Manager delivers the industry’s foremost comprehensive application delivery security solution with the option to deliver both application delivery and security together. The ASM provides application layer protection from targeted and generalized application attacks to ensure that applications are always available. 
(HARDWARE PRODUCT)

Features of a Comprehensive Application Security Solution by Citrix

June 07, 2010 - (Free Research)
This white paper discusses the features of a comprehensive application security solution. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Prioritizing Application Security Concerns by Coverity

May 02, 2012 - (Free Research)
Application security has significantly grown and developed in sophistication over the past few years, but so have the threats that seek to wreak havoc on your software. Read this expert e-guide to learn best practices on how to ensure your applications are protected with the highest level of security possible. 
(EGUIDE) READ ABSTRACT |

Application Security Viewpoint by Ounce Labs, an IBM Company

February 03, 2010 - (Free Research)
Application security is the aspect of understanding how applications are built and how someone could gain an advantage by looking at the application’s flaws. In this podcast, dive into the nature of applications for details on their security and how we interact with them. 
(PODCAST) READ ABSTRACT |

Information Security - IT Decision Checklist: Application Security by Ounce Labs, an IBM Company

December 31, 2009 - (Free Research)
Standards such as SOAP and XML have made it easier to test applications for security holes. We'll explain how to go about this process and what tools are available to help you secure the application layer. 
(EGUIDE) READ ABSTRACT |

2013 Magic Quadrant for Application Security Testing by IBM

July 23, 2013 - (Free Research)
This exclusive paper examines a set of application security testing solutions that are designed to analyze and test applications for security vulnerabilities using static, dynamic and interactive testing techniques. Read on to find out how you can stay ahead of the market. 
(WHITE PAPER) READ ABSTRACT |

Driving Effective Application Security in the Enterprise: An End-to-End Approach to Addressing One of the Biggest Threats to a Business by IBM

July 19, 2013 - (Free Research)
This crucial webcast examines how you can protect existing and developing applications and provides some best practices for ensuring end-to-end application security. 
(WEBCAST) READ ABSTRACT |

Application security testing: Protecting your application and data by IBM

November 07, 2011 - (Free Research)
Application security testing is critical in ensuring your data and applications are safe from security attack. This e-book, written for IT management, including QA and development managers, explains the basics of application security and then delves deeper into common vulnerabilities and performance concerns. 
(EBOOK)

Managing data and application security risks cost effectively by IBM

October 01, 2009 - (Free Research)
This whitepaper shows how organizations can manage data and application security risks cost-effectively by using IBM Tivoli Data and Application Security to reduce costs and improve ROI. It provides examples of IBM customers who have realized the benefit. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Focusing on What's Important with Your Web Application Security: Scanning and Testing by IBM

January 14, 2011 - (Free Research)
Web application security affects every business in some capacity. Regardless of the industry, there are certain Web security weaknesses you can’t afford to overlook and steps you must take to find them. In this presentation transcrip, expert Kevin Beaver shares what you need to know in order to find Web security vulnerabilities in your environment. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

E-Guide: Avoiding Application Security Pitfalls by IBM

January 14, 2011 - (Free Research)
This e-guide will explain why people aren’t integrating security with application lifecycle management, the risks businesses take by not taking security measures seriously and what you can do. Read this e-guide to learn why application security measures often fail and what can be done to mitigate them. 
(EGUIDE) READ ABSTRACT |

Presentation Transcript: What’s New with Rational Application Security? by IBM

December 18, 2010 - (Free Research)
Every day, more and more business is conducted online creating new challenges for meeting web application security and compliance.  This presentation transcript explores an approach that will help your organization address today’s biggest threats. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

E-Book: Technical Guide on Application Security: Secure Development by IBM

December 07, 2010 - (Free Research)
When security practitioners attempt to introduce secure development practices into a development process and organization they are less than accepted. Development organizations tend to reject formal internal structure and process imposed from the outside. Read on to learn how to implement secure development practices in a development organization. 
(EBOOK)

E-Guide: Best Practices for Developing Secure Applications by IBM

November 10, 2010 - (Free Research)
This expert e-guide brought to you by SearchSecurity.com, explains the importance of integrating application security throughout the entire software development lifecycle and provides 4 tips that must be kept in mind on the application security forefront. Read on to uncover these tips and review an assessment of Web application security. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 466 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts